2025: The Untold Stories of Check Point Research
Introduction Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Wh...
Aggregating 3826 articles from trusted cybersecurity sources
Introduction Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Wh...
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybers...
A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone
Can you believe your ears? Increasingly, the answer is no.
For the latest discoveries in cyber research for the week of 23rd February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES France...
University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday
This vulnerability allows local attackers to disclose sensitive information on affected installations of Docker Desktop. An attacker must first obtain the ab...
Spain's police force has announced that it has arrested a 20-year-old man who they claim managed to book luxury hotel rooms worth up to €1,000 a night for ju...
A vulnerability in the Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an un...
Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking ...
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse...
Major U.S.
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissio...
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive informat...
Cybernews reports that leading global luxury apparel retail firms Lacoste, Ralph Lauren, Canada Goose, and Carter's were claimed to have had their "supply ch...
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
Cookeville Regional Medical Center was targeted last year by the Rhysida ransomware group, which stole 500GB of data. The post Data Breach at Tennessee Hospi...
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company's Salesforce environment ear...
A hacking group claims to have broken into the flood defence system protecting Venice's Piazza San Marco - and is offering to sell access to whoever wants it...
Major U.S.
Hacking group ShinyHunters has listed the National Railroad Passenger Corporation on its data leak site, claiming to have stolen 9.4 million records containi...
BleepingComputer reports that McGraw-Hill has disclosed that the limited set of data exposed during a breach caused by a Salesforce misconfiguration was non-...